All Saints' College of Technology: Presented by
All Saints' College of Technology: Presented by
GANDHINAGAR, BHOPAL
PRESENTED BY :
CRYPTOGRAPHY?
INTRODUCTION
it is concerned with making sure that nosy people cannot read, or worse
yet, secretly modify messages intended for other recipients.
In order for cryptography to serve its purposes well, secure and reliable crypt
ographic algorithms are necessary.
TERMINALOGY AND CONCEPTS
SECRET-KEY PUBLIC-KEY
CRYPTOGRAHY CRYPTOGRAPHY
SYMMETRIC-KEY CRYPTOGRAPHY
MODULE CIPHER & STREAM CIPHER
Module Cipher –
• In this, plain text is divided into blocks of fixed length and algorithms are
applied to each block separately.
Stream Cipher –
K1 K2
PUBLIC-KEY CRYPTOGRAPHY
DYNAMIC KEY
• The dynamic key is the new and advance concept in the field of cryptography.
• Once the cryptographic operation executed the key has been discarded. The
concept of dynamic key is based on OTP.
• In this either a long message is divided in too many part or there are many m
essage in both case each message is encrypted with the help of sub keys.
3. Encryption procedure.
4. Decryption procedure.
MODULER DYNAMIC KEY GENERATION
• User input a text key ‘IK’ .Minimum size of IK is 6 bits and it can have maximu
m 14 bits.
TRANSPOSITION
TRANSPOSE (P’)
DK1 XOR
DK2 ADD
FRAGMENTARY CIPHER1
• In this, the units of the plaintext are rearranged in a different and usually q
uite complex order .
PERFORMANCE ANALYSIS
• This algorithm uses the concept of dynamic key & modular cipher which
gives high peed, time & security.
• More work on the key size and key sharing technique may be optimized
in future.
THANK YOU
for listening